Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn Social Engineering From Scratch
SOCIAL ENGINEERING
1. What Is Social Engineering (3:14)
2. Teaser - Hacking An Android Phone & Accessing The Camera (5:34)
3. Course Overview (4:16)
Section: 1 - Preparation - Creating a Penetration Testing Lab
4. Lab Overview & Needed Software (3:27)
5. Installing Kali 2018 As a Virtual Machine Using a Ready Image (8:31)
6. Installing Windows As a Virtual Machine (3:21)
7. Installing Ubuntu As a Virtual Machine (7:05)
Section: 2 - Preparation - Linux Basics
8. Basic Overview Of Kali Linux (4:37)
9. The Linux Terminal & Basic Linux Commands (9:06)
10. Creating & Using Snapshots (6:08)
11. Updating Sources & Installing Program (4:42)
Section: 3 - Information Gathering
12. Introduction (1:52)
Section: 4 - Information Gathering - Gathering Info About A Company/Website
13. Maltego Overview (9:00)
14. Discovering Domain Info & Emails Associated With Target (7:24)
15. Discovering Information About Hosting Company, Support Team Emails & Admin Email (6:55)
16. Discovering Files, Links, Websites & Other Companies Related To Target (5:12)
17. Using The Gathered Info To Build An Attack Strategy (4:16)
Section: 5 - Information Gathering - Gathering Info About A Person
18. Discovering Websites, Links & Social Networking Accounts (9:28)
19. Discovering Twitter Friends & Associated Accounts (4:57)
20. Discovering Emails Of The Target's Friends (4:39)
21. Analysing The Gathered Info & Building An Attack Strategy (8:41)
Section: 6 - Windows Evil Files
22. Introduction (2:14)
Section: 7 - Windows Evil Files - Generating Undetectable Backdoors
23. Installing Veil 3.0 (7:49)
24. Veil Overview & Payloads Basics (7:20)
25. Generating An Undetectable Backdoor Using Veil 3 (9:44)
26. Listening For Incoming Connections (7:25)
27. Hacking A Windows 10 Machine Using The Generated Backdoor (7:12)
28. Installing The Fat Rat (6:18)
29. Generating An Undetectable Backdoor Using TheFatRat (11:29)
30. Installing Empire (4:27)
31. Creating An Empire Listener (6:50)
32. Creating a Windows Powershell Stager & Hacking Windows 10 (7:29)
33. Modifying Backdoor Source To Bypass All Anti-virus Programs (8:13)
Section: 8 - Windows Evil Files - Spying
34. What Is A Keylogger ? (6:23)
35. Creating A Remote Keylogger (4:55)
36. Using A Remote Keylogger To Capture Key Strikes Including Passwords (7:16)
37. Password Recovery Basics (7:29)
38. Recovering Saved Passwords From Local Machine (3:17)
39. Recovering Saved Passwords From A Remote Machine (11:51)
Section: 9 - Windows Evil Files - Enhancing Evil Files
40. Bypassing All Anti-Virus Programs By Modifying Hex Vales (10:35)
41. Creating The Perfect Spying Tool (6:49)
Section: 10 - Windows Evil Files - Converting Evil File To A Trojan
42. Embedding Evil Files With Any File Type Like An Image Or PDF (10:14)
43. Download & Execute Payload (6:18)
44. Running Evil Files Silently In The Background (8:46)
45. Changing Trojan's Icon (8:50)
46. Spoofing File Extension from .exe to anything else (pdf, png ..etc) (11:33)
47. Download & Execute Payload (Method 2) (6:20)
48. Embedding Evil Files With Any File Type Like An Image Or PDF (Method 2) (6:44)
49. Embedding backdoor In A Legitimate Microsoft Office Document (8:45)
50. Embedding Any Evil File In A Legitimate Microsoft Office Document (10:20)
Section: 11 - Mac OS X Evil Files
51. Introduction (3:11)
52. Hacking Mac OS X Using A Meterpreter Backdoor (12:04)
53. Hacking Mac OS X Using An Empire Stager (6:35)
54. Converting Basic Backdoor To An Executable (3:33)
55. Embedding A Normal File With Backdoor (9:20)
56. Download & Execute Payload (6:49)
57. Changing Trojan's Icon (6:34)
58. Configuring The Trojan To Run Silently (6:14)
59. Embedding Backdoor In A Legitimate Microsoft Office Document (6:10)
Section: 12 - Linux Evil Files
60. Hacking Into Linux-Like Systems Using One Command (8:54)
61. More Advanced Linux Backdoor (6:35)
62. Generating A Persistent Remote Keylogger (4:39)
63. Using A Remote Keylogger To Capture Key Strikes Including Passwords (6:43)
64. Recovering Saved Passwords From A Local Machine (7:12)
65. Execute & Report Payload (6:57)
66. Recovering Saved Passwords From A Remote Machine (6:53)
67. Embedding Evil Code In A Legitimate Linux Package - Part 1 (12:37)
68. Embedding Evil Code In A Legitimate Linux Package - Part 2 (4:59)
69. Backdooring a Legitimate Android App (9:45)
Section: 13 - Delivery Methods
70. Introduction (1:51)
71. Preparing Evil Files To Be Delivered Via A URL (6:03)
72. Email Spoofing - Send Emails As Any Email Account (7:20)
73. Hacking OS X & Linux Using Pure Social Engineering Without Sending Any Files (10:09)
74. Creating A Replica Of Any Website / Login Page (6:03)
75. Stealing Login Info Using Fake A Login Page (9:00)
76. BeEF Overview & Basic Hook Method (7:08)
77. Injecting BeEF's Hook In Any Webpage (4:57)
78. Luring Target Into Accessing Evil URL Without Direct Interaction (10:44)
79. Basic BeEF Commands (4:24)
80. Stealing Credentials/Passwords Using A Fake Login Prompt (2:17)
81. Hacking Windows 10 Using A Fake Update (4:40)
82. Hacking Mac OS X Using A Fake Update (4:29)
83. Hacking Linux Using A Fake Update (4:45)
Section: 14 - Using The Above Attacks Outside The Local Network
84. Overview of the Setup (5:55)
85. Ex1 - Generating a Backdoor That Works Outside The Network (5:24)
86. Configuring The Router To Forward Connections To Kali (6:58)
87. Ex2 - Using BeEF Outside The Network (5:49)
Section: 15 - Post Exploitation
88. Introduction (2:11)
89. Upgrading Basic Shell Access To A Meterpreter/Empire Access (9:06)
Section: 16 Post Exploitation - Meterpreter
90. Meterpreter Basics (6:22)
91. File System Commands (5:09)
92. Maintaining Access Basic Methods (5:07)
93. Maintaining Access - Using a Reliable & undetectable Method (6:53)
94. Spying - Capturing Key Strikes & Taking Screen Shots (2:39)
95. Pivoting - Theory (What is Pivoting?) (7:07)
96. Pivoting - Exploiting Devices on The Same Network As The Target Computer (8:11)
97. Controlling Android Phone & Accessing Mic, Camera, Messages, File System & More (8:43)
98. Maintaining Access On OS X (10:28)
Section: 17 - Post Exploitation - Empire
99. Basics Of Empire Agents (6:30)
100. File System Commands (6:43)
101. Upload & Execute Shell Commands (4:33)
102. Injecting Backdoor Process In System Processes (9:38)
103. Stealing root Password & Escalating Privileges On OS X (7:16)
104. Maintaining Access On OS X (5:34)
Section: 18 - Security
105. Detecting Fake/Spoofed Emails (6:08)
106. How to Protect Against BeEF & Other Browser Exploits (4:17)
107. Detecting Trojans Manually (5:32)
108. Detecting Trojans Using a Sandbox (3:16)
70. Introduction
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock